Search alternatives:
networks » network (Expand Search)
Showing 621 - 640 results of 836 for search 'Computer networks Security features.', query time: 0.15s Refine Results
  1. 621
  2. 622

    U-Net-based VGG19 model for improved facial expression recognition by Xiaohu ZHAO, Jingyi ZHANG, Mingzhi JIAO, Lixun XIE, Lanfei WANG, Weiqing SUN, Di ZHANG

    Published 2025-06-01
    “…The improved model not only boosts performance in terms of feature extraction and fusion but is also adept in solving the pressing problems of parameter size and computational efficiency. …”
    Get full text
    Article
  3. 623
  4. 624
  5. 625

    Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols by Yair Rivera Julio, Angel Pinto Mangones, Juan Torres Tovio, María Clara Gómez-Álvarez, Dixon Salcedo

    Published 2025-04-01
    “…Its one-round exchange model and resistance to both passive and active attacks make it particularly well-suited for constrained devices and dynamic network topologies. The originality of the proposal lies in embedding OWL directly into protocols like CoAP, enabling secure session establishment as a native feature rather than as an auxiliary security layer. …”
    Get full text
    Article
  6. 626
  7. 627

    Smart intrusion detection model to identify unknown attacks for improved road safety and management by Faisal Alshammari, Abdullah Alsaleh

    Published 2025-05-01
    “…ACIDS integrates convolutional neural networks (CNN) for hierarchical feature extraction, the synthetic minority over-sampling technique (SMOTE) to address class imbalance and an open-set classification framework to detect novel attack patterns. …”
    Get full text
    Article
  8. 628

    Online Face Detection and Recognition in a Video Stream by Maha Hasso Al-Ghurery, Manar Zidan Al-Abaji

    Published 2013-12-01
    “…In this work a system is designed for Online Face Detection and Recognition depending on multiple algorithms that are: AdaBoost algorithm for the face detection and the two algorithms Principle Component Analysis (PCA) and Linear Discriminate Analysis (LDA) to extract features and use back propagation neural network in recognition. …”
    Get full text
    Article
  9. 629
  10. 630
  11. 631
  12. 632
  13. 633
  14. 634
  15. 635
  16. 636

    Enhancing plant disease detection through deep learning: a Depthwise CNN with squeeze and excitation integration and residual skip connections by Asadulla Y. Ashurov, Mehdhar S. A. M. Al-Gaashani, Nagwan A. Samee, Reem Alkanhel, Ghada Atteia, Hanaa A. Abdallah, Mohammed Saleh Ali Muthanna

    Published 2025-01-01
    “…The architectural modifications are specifically designed to enhance feature extraction and classification performance, all while maintaining computational efficiency. …”
    Get full text
    Article
  17. 637

    Spiking Residual ShuffleNet-Based Intrusion Detection in IoT Environment by Sneha Leela Jacob, H. Parveen Sultana

    Published 2025-01-01
    “…The Internet of Things (IoT) system has been developed to create a smart environment. Privacy and security are critical issues in IoT systems. Security vulnerabilities in IoT-enabled models generate threats that impact various applications. …”
    Get full text
    Article
  18. 638
  19. 639

    Research on multi-user identity recognition based on Wi-Fi sensing by Zhongcheng WEI, Wei CHEN, Yanhu DONG, Bin LIAN, Wei WANG, Jijun ZHAO

    Published 2024-03-01
    “…With the advancement of wireless sensing technology, research on Wi-Fi-based identity recognition has garnered significant attention in fields such as human-computer interaction and home security.While identity recognition based on Wi-Fi signals has achieved initial success, it is currently primarily suitable for scenarios involving individual user behavior.Identity recognition for multiple users in concurrent behavior scenarios still faces a series of challenges, including issues related to mutual interference between users and poor model robustness.Therefore, a Wiblack system for recognizing multiple user identities in a concurrent distribution behavior scenario was proposed.The core idea was to train a multi-branch deep neural network (Wiblack-Net) to extract unique features for each individual user.Firstly, the common features among multiple users were extracted using the backbone network.Then, a binary classifier was assigned to each user to determine the presence of the target user within a given group, thereby achieving identity recognition for multiple users based on concurrent behavior.In addition, experiments comparing Wiblack with several independent binary classification models and a single multiclassification model were conducted to analyze operational efficiency.System performance experimental results demonstrate that when simultaneously identifying the identities of three users, Wibalck achieves an average accuracy of 92.97%, an average precision of 93.71%, an average recall of 93.24%, and an average F1 score of 92.43%.…”
    Get full text
    Article
  20. 640

    Deep Learning-Based Image Watermarking Using Catalan Transform and Non-Negative Matrix Factorization by Md. Fahim Hossain Saikat, Md. Al-Mamun Provath, Kaushik Deb, Pranab Kumar Dhar, Tetsuya Shimamura

    Published 2025-01-01
    “…Security metrics include RE = 0.3094, UACI = 34.21%, and NPCR = 99.15%, demonstrating superior robustness and efficiency over existing approaches.…”
    Get full text
    Article